Jump to content

Infected and Malwarebytes can't seem to clean it up


Recommended Posts

Hello locken25 and welcome to Malwarebytes,

My screen name is kevinf80, i`m here to help clean up your system. Make sure to run all scans from accounts with Administrator status, continue as follows please:

Anyone other than the original starter of this thread please DO NOT follow the instructions and advice posted as replies here, my help and advice is NOT related to your system and will probably cause more harm than good...

Continue with the following:

Uninstall the following via Programs and Features...

Note-UP

Next,

Download attached fixlist.txt file (end of reply) and save it to the Desktop, or the folder you saved FRST into. "Do not open that file"
NOTE. It's important that both FRST and fixlist.txt are in the same location or the fix will not work.

Open FRST and press the Fix button just once and wait.
The tool will make a log on the Desktop (Fixlog.txt) or the folder it was ran from. Please post it to your reply.

Next,

Clean install Malwarebytes from version 2 to version 3...

Please download MBAM-clean and save it to your desktop.
 
  • Right-click on mbam-clean.exe icon and select user posted image Run as Administrator to start the tool.
  • It will ask you to reboot the machine - please do so.
  • Run the cleaner tool again, re-boot when complete. <<<---do not miss this step


If you have lost the activation licence key information it can be located here: http://www.cleverbridge.com/342/?scope=cusecolp

Download Malwarebytes version 3 from the following link:

https://www.malwarebytes.com/mwb-download/thankyou/

Double click on the installer and follow the prompts. If necessary select the Blue Help tab for video instructions....

When the install completes and is updated do the following:

Open Malwarebytes, select > "settings" > "protection tab"

Scroll down to "Scan Options" ensure Scan for Rootkits and Scan within Archives are both on....

Go back to "DashBoard" select the Blue "Scan Now" tab......

When the scan completes deal with any found entries... Then select "Export Summary" then "Text File (*.txt)" name that log and save , you can copy or attach that to your reply...

If you have lost the activation licence key information it can be located here: http://www.cleverbridge.com/342/?scope=cusecolp

Next,

Download AdwCleaner by Xplode onto your Desktop.
 
  • Double click on Adwcleaner.exe to run the tool.
  • Click on the Scan in the Actions box
  • Please wait fot the scan to finish..
  • When "Waiting for action.Please uncheck elements you want to keep" shows in top line..
  • Click on the Cleaning box.
  • Next click OK on the "Closing Programs" pop up box.
  • Click OK on the Information box & again OK to allow the necessary reboot
  • After restart the AdwCleaner(C*)-Notepad log will appear, please copy/paste it in your next reply. Where * is the number relative to list of scans completed...


Next,

Download Sophos Free Virus Removal Tool and save it to your desktop.

If your security alerts to this scan either accept the alert or turn off your security to allow Sophos to run and complete.....

Please Do Not use your PC whilst the scan is in progress.... This scan is very thorough so may take several hours...
 
  • Double click the icon and select Run
  • Click Next
  • Select I accept the terms in this license agreement, then click Next twice
  • Click Install
  • Click Finish to launch the program
  • Once the virus database has been updated click Start Scanning
  • If any threats are found click Details, then View log file... (bottom left hand corner)
  • Copy and paste the results in your reply
  • Close the Notepad document, close the Threat Details screen, then click Start cleanup
  • Click Exit to close the program
  • If no threats were found please confirm that result....



The Virus Removal Tool scans the following areas of your computer:
  • Memory, including system memory on 32-bit (x86) versions of Windows
  • The Windows registry
  • All local hard drives, fixed and removable
  • Mapped network drives are not scanned.


Note: If threats are found in the computer memory, the scan stops. This is because further scanning could enable the threat to spread. You will be asked to click Start Cleanup to remove the threats before continuing the scan.

Let me see those logs in your reply, also tell me if you have any remaining issues or concerns...

Thank you,

Kevin...

fixlist.txt

Link to post
Share on other sites

Can you post  what is being blocked by Malwarebytes...Open Malwarebytes, select > "Reports" > checkmark (tick) on a blocked entry > "View Report" > "Export" > save to a text file and attach to your reply or copy to clipboard and paste to your reply...


Next,

Download and save RogueKiller to your Desktop from this link:

https://www.fosshub.com/RogueKiller.html/setup.exe

Right click setup.exe and select Run as Administrator to start installing RogueKiller.

At the next window Checkmark "Install 32 and 64 bit versions, then select "Next"

user posted image

In the next window skip Licence I.D. and Licence Key, select "Next"

user posted image

In the next window make no changes and select "Next"

user posted image

In the next window leave both "Additional Shortcuts" checkmarked, then select "Next"

user posted image

In the next window make no changes and select "Install"

user posted image

RogueKiller will extract and complete installation, in the new window leave "Launch Roguekiller" checkmarked, then select finish.

user posted image

RogueKiller will launch. Accept UAC, then read and accept "User Agreements"

user posted image

In the new window the "Home" tab should already be selected, Change by selecting "Scan" tab, then select "Start Scan"

user posted image

When the scan completes select "Open Report"

user posted image

In the new Window select "Export text" name that file RK.txt, save to your Desktop and attach to your reply

user posted image

Let me see those logs....
 
Thank you,
 
Kevin
Link to post
Share on other sites

Continue with the following:

Right click on RogueKiller.exe and select "Run as Administrator" to start the tool, accept UAC..

In the new window the "Home" tab should already be selected, Change by selecting "Scan" tab, then select "Start Scan"

user posted image

When the scan completes checkmark (tick) the following against Process entries, ensure that all other entries are not Checkmarked.

[Suspicious.Path|Proc.Injected|Proc.RunPE|VT.Trojan.Win32.Agent.nezfcx] nhspg.exe(5808) -- C:\Users\brigh\AppData\Local\Afpworks\nhspg.exe[-] -> Found

Checkmark (tick) the following against Registry entries, ensure that all other entries are not Checkmarked

[Suspicious.Path|VT.Trojan.Win32.Agent.nezfcx] (X64) HKEY_USERS\S-1-5-21-576910824-1960240654-1746704346-1001\Software\Microsoft\Windows\CurrentVersion\Run | {4CC65920-D261-005F-D147-CD5F310CC51F} : C:\Windows\Temp\nhspg.exe [-] -> Found
[Suspicious.Path|VT.Trojan.Win32.Agent.nezfcx] (X64) HKEY_USERS\S-1-5-21-576910824-1960240654-1746704346-1001\Software\Microsoft\Windows\CurrentVersion\Run | Afpworks : C:\Users\brigh\AppData\Local\Afpworks\nhspg.exe [-] -> Found
[Suspicious.Path|VT.Trojan.Win32.Agent.nezfcx] (X86) HKEY_USERS\S-1-5-21-576910824-1960240654-1746704346-1001\Software\Microsoft\Windows\CurrentVersion\Run | {4CC65920-D261-005F-D147-CD5F310CC51F} : C:\Windows\Temp\nhspg.exe [-] -> Found
[Suspicious.Path|VT.Trojan.Win32.Agent.nezfcx] (X86) HKEY_USERS\S-1-5-21-576910824-1960240654-1746704346-1001\Software\Microsoft\Windows\CurrentVersion\Run | Afpworks : C:\Users\brigh\AppData\Local\Afpworks\nhspg.exe [-] -> Found


Checkmark (tick) the following against Tasks entries, ensure that all other entries are not Checkmarked

[Suspicious.Path|VT.not-a-virus:AdWare.Win32.Vopak.ekpz] \AppDataUpdater -- "C:\windows\adsvr.exe" -> Found
[PUP.HackTool|VT.Trojan.Win32.Generic!BT] \AutoKMS -- C:\WINDOWS\AutoKMS\AutoKMS.exe -> Found


Checkmark (tick) the following against File[/]] entries, ensure that all other entries are not Checkmarked

[PUP.Gen0][File] C:\Users\brigh\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\G?ogle Chr?m?.lnk [LNK@] C:\Users\brigh\AppData\Roaming\Browsers\exe.emorhc.bat -> Found
[PUP.Gen0][File] C:\Users\brigh\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\G??gle Chr?m?.lnk [LNK@] C:\Users\brigh\AppData\Roaming\Browsers\exe.emorhc.bat -> Found
[PUP.HackTool][Folder] C:\Windows\AutoKMS -> Found
[PUP.Gen1][Folder] C:\Users\brigh\AppData\Roaming\Easeware -> Found
[PUP.Gen0][File] C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Age of Wonders III [GOG.com]\?g? ?f W?nders III.lnk [LNK@] C:\Users\brigh\AppData\Roaming\Browsers\exe.rehcnual3woa.bat -> Found
[PUP.Gen0][File] C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Battle.net\??ttl?.n?t.lnk [LNK@] C:\Users\brigh\AppData\Roaming\Browsers\exe.rehcnual ten.elttab.bat -> Found
[PUP.Gen0][File] C:\ProgramData\Microsoft\Windows\Start Menu\Programs\DAEMON Tools Lite\D??MON Tools Lit?.lnk [LNK@] C:\Users\brigh\AppData\Roaming\Browsers\exe.rehcnualtd.bat -> Found
[PUP.Gen0][File] C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Final Fantasy X X-2 HD Remaster\Fin?l F?ntasy X X-2 ?D R?m?st?r.lnk [LNK@] C:\Users\brigh\AppData\Roaming\Browsers\exe.rehcnual_2-x&xff.bat -> Found
[PUP.Gen0][File] C:\ProgramData\Microsoft\Windows\Start Menu\Programs\G??gle ?hr?me.lnk [LNK@] C:\Users\brigh\AppData\Roaming\Browsers\exe.emorhc.bat -> Found
[PUP.Gen0][File] C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Hearthstone\??arthstone.lnk [LNK@] C:\Users\brigh\AppData\Roaming\Browsers\exe.rehcnual ateb enotshtraeh.bat -> Found
[PUP.Gen0][File] C:\ProgramData\Microsoft\Windows\Start Menu\Programs\League of Legends\L??gue of Leg?nds.lnk [LNK@] C:\Users\brigh\AppData\Roaming\Browsers\exe.rehcnual.lol.bat -> Found
[PUP.Gen0][File] C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Torchlight 2 [GOG.com]\??r?hlight 2.lnk [LNK@] C:\Users\brigh\AppData\Roaming\Browsers\exe.rehcnualdom.bat -> Found


Checkmark (tick) the following against Web Browser entries, ensure that all other entries are not Checkmarked

[PUM.HomePage][Chrome:Config] Default [SecurePrefs] : homepage [https://%66%65%65%64.%73%6E%61%70%64%6F.%63%6F%6D/?p=mKO_AwFzXIpYRaHdGIjVkxlyIP4NYe17aVLWoSb9jPybnVd5nYQEhd971c3ISZx97t7Pd-qaY4JdujBksTjCtbiJoymiBUDJU8c14ad7zpTvdDVyc7mTc3nGkw2ux-HkNRcefEqeMqOwKk83TnEjF9DYEWXfWGIhvp_8fn6kA3e1_g3AsK8WS21NOD5M-Xd9gGR6eRKmwBxm] -> Found
[PUM.SearchPage][Chrome:Config] Default [SecurePrefs] : default_search_provider_data.template_url_data.keyword [google.com_] -> Found
[PUM.SearchPage][Chrome:Config] Default [SecurePrefs] : default_search_provider_data.template_url_data.suggestions_url [http://suggestqueries.google.com/complete/search?q={searchTerms}] -> Found



Hit the Delete
button, when complete select "Open Report" in the next window select "Export txt" the log will open. Save to your Desktop for reference, also attach to next reply.
 
Post that log, also tell me if you have any remaining issues or concerns...
 
Thank you,
 
Kevin..
Link to post
Share on other sites

Those errors are related to found DNS settings and IP addresses, there is no code attached so are not definite suspicious entries. I get no suspicious returns when checking the IP settings...

IP Location Jamaica Jamaica Kingston Columbus Communications Jamaica Limited
ASN Jamaica AS30689 FLOW-NET - FLOW, JM (registered Dec 05, 2003)
Resolve Host ns3.isp.jm.flow.cc
Whois Server whois.arin.net
IP Address 65.183.0.76

 

How is your PC behaving now, do you have any remaining issues or concerns...?

Link to post
Share on other sites

  • Root Admin

Due to the lack of feedback this topic is closed to prevent others from posting here. If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this thread with your request. This applies only to the originator of this thread.Other members who need assistance please start your own topic in a new thread. Thanks!

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.